This course is intended to provide a deeper understanding of Information Architecture than what is available in the basic TOGAF 9.1 Certification course. Exercises will enhance learning for the topic with hands-on experiences based on real-life examples.Part of the work in the Business Architecture domain identifies the common information, and the sources and flows of information the organization relies on to perform its operations. Work in Information Architecture focuses on the delivery of information required by business operations to accomplish the business functional mission. This flow of information through the different systems is managed by applications and infrastructure of the enterprise. Common stakeholder concerns regarding authenticity, availability, and security should also be addressed.A key to understanding Information Architecture is that information is not just raw data, but data in context. Understanding the value of that contextual data is even more critical to the proper management of the information.
Completion of TOGAF 9 Certification or EA with TOGAF and Navigate is an asset.
2 Days/Lecture & Lab
This course is designed for Chief Architects, Business Leaders, Business Architects, Business Analysts and Enterprise Architects.
- Explain the difference between data and information.
- Discuss the challenges of structured and unstructured data, and their relationship to the challenges of big and extreme data sets.
- Demonstrate techniques of working with stakeholders to identify and track business terms that represent information.
- Explain the impact of different time constraints on information.
- Explain quality assurance implications for information.
- Explain the different mechanism for integrating, transforming and structuring information.
- Explain the implications of source authenticity for information.
- Explain the difference of information ownership and information custody.
- Explain the use of taxonomies and how they are applied to the categorization of information.
- Explain implications and common concerns regarding information security.